Cloud Computing

Security Challenges and Opportunities: The Need for Strict Internet Security for Cloud Computers

Celita Y. Ingram

Presented to
Dr. Maurice Dawson

Alabama Agricultural and Mechanical University

June 23, 2012

Topic SelectionCloud Computers contribute to organizations by providing a useful way for businesses to access instant on-demand networks to the Web, but the companies have less regulation over their information and the important data can be compromised. Thesis: It is of critical importance to find an all-inclusive resolution for strict internet security in order to protect data for businesses and in other areas with access to cloud computing. Background Information

Cloud computing is the preferred way for businesses and institutions to fundamentally change the way they manage their computing needs. Cloud computing is an on-demand network for delivering services that use multiple server computers through a digital network to resources, such as networks, servers, applications, storage capacity and services, as if it was one computer. It is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned. This cloud model promotes availability and is composed of five essential characteristics, and four deployment models. The cloud controls a number of activities, such as back-up, providing power instantly, increased storage capacity, a decrease in hardware and software demands, and the ability to obtain data resources whenever needed. Many organizations rely on the cloud computing networks because they can help the organizations prosper. This is associated with potentially improving the way IT delivers systems and applications, providing a better user experience, easier implementation of solutions, faster time to market, and reduced cost of ownership (Deloitte 2012). Every place or person that you interact with on the internet will be connected. The service is always up-to-date with the latest version software, performs automatically and provides new features for the applications along with performance enhancements. The paradigm is that the computing resources and software are available to the end user, whether organization or individual, using a ‘pay as you go’ approach (Hayes 2009). The service is relatively inexpensive and fully managed by the provider. The smartphone applications, research institutions and the video game industry all use cloud computing to store and access massive amounts of data. Individuals with e-mail accounts like Hotmail, Yahoo! Mail, and Gmail, also experience cloud computing by logging in to a Web e-mail account. Ultimately, there is a place in technology for cloud computing that is specifically for the world of business. The consequences to using the cloud computing services with an organization can be detrimental to the organization. The biggest concerns of cloud computing are security and privacy. The privacy concern arises because the system administrators are custodians of a huge quantity of data, and cloud computing magnifies it. When conference organizers have to install the software from scratch, there was still a risk of breach of confidentiality, but the data was just about one conference. Cloud computing solutions allow data to be aggregated across thousands of conferences over decades, presenting tremendous opportunities for abuse if the data gets into the wrong hands. The data could be deliberately or accidentally disclosed, with unwelcome consequences. Many privacy and confidentiality concerns arise because the service provider has access to all the data, and could accidentally or deliberately disclose it or use it for unauthorized purposes (Ryan 2011). For example, Amazon’s Cloud data center crashed during a severe storm bringing down numerous high profile websites hosted on Amazon, including Netflix, Instagram,...

You May Also Find These Documents Helpful

...CloudcomputingCloudcomputing is the use of computing hardware and software that is delivered as a service e.g. the internet. Being discussed in this essay will be some dangers of using a third party to store. We will also be stating the assurance and practises cloudcomputing firms could offer businesses to reduce the risk of third party storing. We will also be discussing the role of the government in helping cloudcomputing realise its potential. Lastly we will be addressing why the company Microsoft is now lobbying for the government.
1.1 Storing on a personal computer rather than in a cloud.
The reason why we would rather store personal files on our personal computers is because the personal computer has a higher storage, it can hold up to 550GB and more but a cloud will only allow you to store about 5GB,the downloading and uploading speed on a cloud is quite slow compared to that of a normal computer , a PC has much more features compared to a cloud, but the main reason for choosing a personal computer over a cloud is for privacy reasons, when saving on a cloud you can experience hacking issues, identity theft, as well as allowing your personal information to be viewed all over the world.
1.2 Dangers of cloudcomputing for...

...CloudComputing is a process of delivering a companies or individual’s applications and documents from any place, at any time, on any device. It is also a process in which hosted services are delivered through the internet.
Cloudcomputing helps in bringing together complex IT documents in a small number of places, which can be managed easily. Although cloudcomputing has its advantages such as simplicity and cost, there are certain security concerns which have been brought about by users, as it involves storing important, and critical data in a shared and public environment. The issues on security concerns can be explained as follows:
Data storage Location
When a company or individual uses cloud they would not know where their data is being held, including the personal, sensitive and critical documents. The data are obviously residing in a specific county and is unknown to the cloud user. Different countries have various privacy policies and laws according to their jurisdiction. A concern is that, if the cloud provider would commit themselves to obeying the privacy requirements of the holding country on behalf of the cloud users, who are their valuable customers.
User Access
According to the EU Law personal information can only be obtained due to a valid reason by a service provider. If an organization or hosting service...

...Cloudcomputing is able to offer a distinct advantage to companies willing to move into this growing arena. This is not without its drawbacks. Even in the definition of CloudComputing by the National Institute of Standards and Technology, (NIST) clear advantages exist. The definition includes the following terms: on demand self-service, ubiquitous network access, location independent resource pooling, rapid elasticity and measured service.
CloudComputing: Advantages
On demand self-service is a hugely important aspect of cloudcomputing. It allows for individuals using the service to be able to use all of the functions immediately. This ties in with the advantages of network access where you can access the functions of the cloudcomputing system that you are using immediately, from anywhere, on any device. The rapid elasticity is also a major advantage of cloudcomputing as it can be updated at the core location and then this update transfers down to the individual users, so they do not need to have a significant change on their device.
Cloudcomputing is able to offer many distinct advantages in the business environment. Cloudcomputing exists in two primary forms. The first of these is using a cloudcomputing...

...﻿CLOUDCOMPUTING
INTRODUCTION
Cloudcomputing refers as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort of service provider interaction (Mell & Grance, 2012). While Huth & Cebula (2011) defines cloudcomputing as a subscription-based service where you can obtain networked storage space and computer resources. The most important thing when dealing with cloudcomputing is having internet access. This is because the files in cloudcomputing does not stored in physical computers but with the third party servers in which user can access it through an internet connection regardless of the location.
Many people and especially business moving to cloudcomputing because of their benefits which reduce cost and complexity, increases efficiency, helps improve cash flow and offers many more benefits. Cloud is one of the innovations that people invented where users do not have to buy or invest in information technology infrastructure, hardware and software licences.
Simply put, cloudcomputing is the delivery of computing services over the Internet. Many people nowadays use cloud...

...Type of CloudComputingCloudComputing can be divided by two main criteria. The first criterion is service models, and another criterion is deployment models.
Service Models
For service model criterion, cloudcomputing can be divided into three types which are software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS)
Software as a Service (SaaS)
The first service model, software as a service, likes an online application. Service provider is responsible to provide, manage and maintain all of service, such as infrastructure, platform and software. Also, customers are not acceptable to manage the service. However, some applications allow consumers to configure minor features.
Customers are able to use applications that service owner provided via web browser or thin client.
Examples of software as a service are Google Apps, such as Gmail and Google docs, and Apple iCloud.
Platform as a Service (PaaS)
The second service model, platform as a service, is a service that was improved from software as a service. Customers are not able to use only software that delivers from service provider, but they are able to organize some configurations, including produce their own new applications.
Platform as a service is able to break down into three main types. These types are called add-on application platform, stand-alone application platform...

...﻿ISOM4100 Case 2 CloudComputing Lau Lee Sho 10048464
1.
Public cloud
Private cloud
Hybrid cloud
Performance
Low to medium
Very good
Good
Security
Good, depends on security measures of the service provider
Most secure, as all storage is on-premise
Very secure, integration options add an additional layer of security
Reliability
Medium, depends on Internet connectivity and service provider availability
High, as all equipment is on-premise
Medium to high, as cached content is kept on-premise, but also depends on connectivity and service provider availability
Cost
Very good, pay-as-you-go model and no need for on-premise storage infrastructure
Good, but requires on-premise resources, such as data center space, electricity and cooling
Improved, since it allows moving some storage resources to a pay-as-you-go model
Owner
External maintained
Internally maintained
Internally/ External maintained
2. I would give my suggestion base on clients’ acceptable level of computing performance, sensitivity of data and IT budget. If customer data need a high level of security, I would suggest it adopting private cloud due to its on-premise storage and high reliability. Company can gain full control over the systems without handing over confidential data to service provider site. On the other hand, if the customer data is not sensitive, I would...

...Will the cloud have as big an impact as many predict? A complex question. Cloudcomputing is available now; it’s already changing the manner in which IT and business services are delivered and managed. But as is often the case with new technologies, organizations may overestimate the short-term effects while simultaneously underestimating the long-term benefits. Without understanding the larger wave of IT developments of which the cloud is just a part, companies may invest in capabilities that will not pay off sufficiently—potentially compromising their competitiveness as time goes on.
New research from the London School of Economics and Accenture—based on a survey of 1,035 business and IT executives, as well as in-depth interviews with more than 35 service providers and other stakeholders—finds that the cloud will have a strong near-term impact on the majority of organizations. Twenty percent of respondents are already using cloud capabilities for a variety of services, including corporate email, websites, storage and customer relationship management. Similar numbers plan to make the transition in the next 18 months—a doubling of cloud usage in a very short timeframe.
From cost to innovation: Three major impacts
Near-term investments in cloudcomputing will be dominated by a cost perspective, using cloud-based services to drive...

...11/26/2012
I) How does cloudcomputing work? How did it come about? Where is it going in the future? II) How does it affect people and businesses: What is its value? What negative impact does it have? III) Which companies will sell it and what is the nature of the business? IV) Does government need to control this new technology? Why ? V) Opinion about Cloudcomputing.
IN 2009 The Cloud Security Alliance declared that the “cloud describes the use of a collection of services, applications, information, and infrastructure comprised of pools of compute, network, information, and storage resources. These components can be rapidly orchestrated, provisioned, implemented and decommissioned, or scaled up and down (Rapid elasticity ) ” . Indeed cloudcomputing is used by people; they use computing resources ( hardware and software ) delivered on the internet ( over a network ) and reachable through heterogeneous devices ( Broad network access) . End users can access cloud based applications via the internet while the business software and user’s data are stored on servers . Thus, All they can see are “front-end layers “ ,that is, interfaces that people see and interact with ., these very layers need to be fuelled, though . That’s the role of “back-end layers”, they consist of the hardware and the software architecture .
Reference :...